{"id":4121,"date":"2023-11-09T09:45:43","date_gmt":"2023-11-09T09:45:43","guid":{"rendered":"https:\/\/secry.me\/explore\/?p=4121"},"modified":"2023-11-15T02:56:35","modified_gmt":"2023-11-15T02:56:35","slug":"understand-what-is-penetration-testing-fundamental-knowledge","status":"publish","type":"post","link":"https:\/\/secry.me\/explore\/understand-what-is-penetration-testing-fundamental-knowledge\/","title":{"rendered":"Understand what is Penetration Testing? Fundamental Knowledge"},"content":{"rendered":"<div class=\"c7f5092f831f91fb6af859cc3a8052cc\" data-index=\"4\" style=\"float: none; margin:10px 0 10px 0; text-align:center;\">\n<script async src=\"https:\/\/securepubads.g.doubleclick.net\/tag\/js\/gpt.js\"><\/script>\r\n<script>\r\n  window.googletag = window.googletag || {cmd: []};\r\n  googletag.cmd.push(function() {\r\n    googletag.defineSlot('\/22608490431\/iklan1', [[320, 100], [300, 50]], 'div-gpt-ad-1696178236578-0').addService(googletag.pubads());\r\n    googletag.pubads().enableSingleRequest();\r\n    googletag.enableServices();\r\n  });\r\n<\/script>\r\n<!-- \/22608490431\/iklan1 -->\r\n<div id='div-gpt-ad-1696178236578-0' style='min-width: 300px; min-height: 50px;'>\r\n  <script>\r\n    googletag.cmd.push(function() { googletag.display('div-gpt-ad-1696178236578-0'); });\r\n  <\/script>\r\n<\/div>\n<\/div>\n<h2>What is Penetration Testing?<\/h2>\n<p><strong>SECRY &#8211; PENTEST &#8211;<\/strong> Penetration testing, also known as pen test-ing or ethical hacking, is a simulated <a href=\"https:\/\/secry.me\/explore\/category\/news\/\">cyberattack<\/a> against a computer system, network, or web application to identify security weaknesses and vulnerabilities. It is a proactive cybersecurity measure that helps organizations improve their security posture by uncovering and remediating potential security flaws before they can be exploited by malicious actors.<\/p>\n<p>&nbsp;<\/p>\n<h3>Purpose of Penetration Testing<\/h3>\n<p>The primary purpose of penetration testing is to assess the security effectiveness of a system or application. It helps organizations to:<\/p>\n<ul>\n<li>Identify and understand their security vulnerabilities<\/li>\n<li>Evaluate the effectiveness of their security controls<\/li>\n<li>Prioritize remediation efforts<\/li>\n<li>Improve their overall security posture<\/li>\n<\/ul>\n<p>&nbsp;<\/p>\n<h3>Types of Penetration Testing<\/h3>\n<p>There are various types of penetration testing, each focusing on a specific aspect of security. Some common types include:<\/p>\n<ul>\n<li>Network penetration testing: This type of testing focuses on identifying vulnerabilities in network infrastructure, such as routers, firewalls, and switches.<\/li>\n<li>Web application penetration testing: This type of testing focuses on identifying vulnerabilities in web applications, such as SQL injection and cross-site scripting (XSS).<\/li>\n<li>System penetration testing: This type of testing focuses on identifying vulnerabilities in operating systems, such as misconfigurations and unpatched vulnerabilities.<\/li>\n<li>Social engineering penetration testing: This type of testing focuses on identifying vulnerabilities in human behavior, such as phishing attacks and social engineering scams.<\/li>\n<\/ul>\n<p>&nbsp;<\/p>\n<h3>Penetration Test Methodology<\/h3>\n<p>The penetration testing process typically involves the following steps:<\/p>\n<ol>\n<li>Planning and scoping: The penetration tester defines the scope of the test, including the systems or applications to be tested, the testing methodology, and the reporting format.\\<\/li>\n<li>Reconnaissance: The penetration tester gathers information about the target system or application, such as its network topology, operating systems, and applications in use.<\/li>\n<li>Scanning and vulnerability assessment: The penetration tester uses automated tools to scan the target system or application for known vulnerabilities.<\/li>\n<li>Exploitation: The penetration tester attempts to exploit the identified vulnerabilities to gain unauthorized access or compromise the system.<\/li>\n<li>Post-exploitation: The tester investigates the extent of the compromise and identifies potential remediation measures.<\/li>\n<li>Reporting: The tester documents the findings of the penetration test, including the identified vulnerabilities, the attack techniques used, and the potential impact of the compromise.<\/li>\n<\/ol>\n<p>&nbsp;<\/p>\n<h3>Benefits of Penetration Test<\/h3>\n<p>Penetration testing offers numerous benefits to organizations, including:<\/p>\n<ol>\n<li>Improved security posture: By identifying and remediating vulnerabilities, organizations can significantly reduce their risk of cyberattacks.<\/li>\n<li>Reduced financial losses: Cyberattacks can cause significant financial losses, including data breaches, lost revenue, and damage to reputation. Penetration testing can help organizations avoid these losses.<\/li>\n<li>Enhanced compliance: Many industries have regulations that require organizations to conduct regular penetration testing. Compliance with these regulations can help organizations avoid legal and financial penalties.<\/li>\n<li>Increased awareness of security risks: Penetration testing can help raise awareness of security risks among employees, leading to more secure behaviors and practices.<\/li>\n<\/ol>\n<h2>Conclusion<\/h2>\n<p>Penetration testing is an essential component of any <a href=\"https:\/\/www.google.com\/search?q=cyber+security+program\">cybersecurity program<\/a>. By proactively identifying and remediating vulnerabilities, organizations can significantly reduce their risk of cyberattacks and protect their valuable assets.<\/p>\n<div id=\"urban-overlay\" style=\"left: -10px; top: -10px; width: 0px; height: 0px;\"><\/div>\n\n<div style=\"font-size: 0px; height: 0px; line-height: 0px; margin: 0; padding: 0; clear: both;\"><\/div>","protected":false},"excerpt":{"rendered":"<p>What is Penetration Testing? SECRY &#8211; PENTEST &#8211; Penetration testing, also known as pen test-ing or ethical hacking, is a simulated cyberattack against a computer system, network, or web application to identify security weaknesses and vulnerabilities. It is a proactive cybersecurity measure that helps organizations improve their security posture by uncovering and remediating potential security [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":4128,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[194,248],"tags":[335,4,377],"class_list":{"0":"post-4121","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-cyber-security","8":"category-question","9":"tag-hacker","10":"tag-hacking","11":"tag-penetration-tester"},"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v21.4 (Yoast SEO v27.5) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Understand what is Penetration Testing? Fundamental Knowledge | SECRY<\/title>\n<meta name=\"description\" content=\"What is Penetration Testing? SECRY - PENTEST - Penetration testing, also known as pen test-ing or ethical hacking, is a simulated cyberattack against a\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/secry.me\/explore\/understand-what-is-penetration-testing-fundamental-knowledge\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Understand what is Penetration Testing? Fundamental Knowledge | SECRY\" \/>\n<meta property=\"og:description\" content=\"What is Penetration Testing? SECRY - PENTEST - Penetration testing, also known as pen test-ing or ethical hacking, is a simulated cyberattack against a\" \/>\n<meta property=\"og:url\" content=\"https:\/\/secry.me\/explore\/understand-what-is-penetration-testing-fundamental-knowledge\/\" \/>\n<meta property=\"og:site_name\" content=\"SECRY\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/secry.me\" \/>\n<meta property=\"article:published_time\" content=\"2023-11-09T09:45:43+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2023-11-15T02:56:35+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/secryweb.sirv.com\/WP_secry.me\/2023\/11\/6b51fa78-59d4-48bd-b494-41a9d0499275.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1024\" \/>\n\t<meta property=\"og:image:height\" content=\"1024\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Christin\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Christin\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"NewsArticle\",\"@id\":\"https:\\\/\\\/secry.me\\\/explore\\\/understand-what-is-penetration-testing-fundamental-knowledge\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/secry.me\\\/explore\\\/understand-what-is-penetration-testing-fundamental-knowledge\\\/\"},\"author\":{\"name\":\"Christin\",\"@id\":\"https:\\\/\\\/secry.me\\\/explore\\\/#\\\/schema\\\/person\\\/a0dca9413073b143bfc0db687dd0b0d6\"},\"headline\":\"Understand what is Penetration Testing? Fundamental Knowledge\",\"datePublished\":\"2023-11-09T09:45:43+00:00\",\"dateModified\":\"2023-11-15T02:56:35+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/secry.me\\\/explore\\\/understand-what-is-penetration-testing-fundamental-knowledge\\\/\"},\"wordCount\":502,\"commentCount\":1,\"publisher\":{\"@id\":\"https:\\\/\\\/secry.me\\\/explore\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/secry.me\\\/explore\\\/understand-what-is-penetration-testing-fundamental-knowledge\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/secry.me\\\/explore\\\/wp-content\\\/uploads\\\/2023\\\/11\\\/6b51fa78-59d4-48bd-b494-41a9d0499275.jpg\",\"keywords\":[\"Hacker\",\"hacking\",\"Penetration Tester\"],\"articleSection\":[\"Cyber Security\",\"Question\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/secry.me\\\/explore\\\/understand-what-is-penetration-testing-fundamental-knowledge\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/secry.me\\\/explore\\\/understand-what-is-penetration-testing-fundamental-knowledge\\\/\",\"url\":\"https:\\\/\\\/secry.me\\\/explore\\\/understand-what-is-penetration-testing-fundamental-knowledge\\\/\",\"name\":\"Understand what is Penetration Testing? Fundamental Knowledge | SECRY\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/secry.me\\\/explore\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/secry.me\\\/explore\\\/understand-what-is-penetration-testing-fundamental-knowledge\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/secry.me\\\/explore\\\/understand-what-is-penetration-testing-fundamental-knowledge\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/secry.me\\\/explore\\\/wp-content\\\/uploads\\\/2023\\\/11\\\/6b51fa78-59d4-48bd-b494-41a9d0499275.jpg\",\"datePublished\":\"2023-11-09T09:45:43+00:00\",\"dateModified\":\"2023-11-15T02:56:35+00:00\",\"description\":\"What is Penetration Testing? SECRY - PENTEST - Penetration testing, also known as pen test-ing or ethical hacking, is a simulated cyberattack against a\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/secry.me\\\/explore\\\/understand-what-is-penetration-testing-fundamental-knowledge\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/secry.me\\\/explore\\\/understand-what-is-penetration-testing-fundamental-knowledge\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secry.me\\\/explore\\\/understand-what-is-penetration-testing-fundamental-knowledge\\\/#primaryimage\",\"url\":\"https:\\\/\\\/secry.me\\\/explore\\\/wp-content\\\/uploads\\\/2023\\\/11\\\/6b51fa78-59d4-48bd-b494-41a9d0499275.jpg\",\"contentUrl\":\"https:\\\/\\\/secry.me\\\/explore\\\/wp-content\\\/uploads\\\/2023\\\/11\\\/6b51fa78-59d4-48bd-b494-41a9d0499275.jpg\",\"width\":1024,\"height\":1024,\"caption\":\"A young man is doing Penetration Testing\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/secry.me\\\/explore\\\/understand-what-is-penetration-testing-fundamental-knowledge\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/secry.me\\\/explore\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Understand what is Penetration Testing? Fundamental Knowledge\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/secry.me\\\/explore\\\/#website\",\"url\":\"https:\\\/\\\/secry.me\\\/explore\\\/\",\"name\":\"SECRY\",\"description\":\"#1 Cyber [SEC]urity Sto[RY]  -  News &amp; Bug Bounty Story Collections\",\"publisher\":{\"@id\":\"https:\\\/\\\/secry.me\\\/explore\\\/#organization\"},\"alternateName\":\"Security Story\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/secry.me\\\/explore\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/secry.me\\\/explore\\\/#organization\",\"name\":\"#1 Cyber [SEC]urity Sto[RY] - News & Bug Bounty Story Collections\",\"alternateName\":\"SECRY\",\"url\":\"https:\\\/\\\/secry.me\\\/explore\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secry.me\\\/explore\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/secryweb.sirv.com\\\/WP_secry.me\\\/2022\\\/06\\\/cropped-SECRY.webp\",\"contentUrl\":\"https:\\\/\\\/secryweb.sirv.com\\\/WP_secry.me\\\/2022\\\/06\\\/cropped-SECRY.webp\",\"width\":512,\"height\":512,\"caption\":\"#1 Cyber [SEC]urity Sto[RY] - News & Bug Bounty Story Collections\"},\"image\":{\"@id\":\"https:\\\/\\\/secry.me\\\/explore\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/secry.me\",\"https:\\\/\\\/pinterest.com\\\/secry_me\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/secry.me\\\/explore\\\/#\\\/schema\\\/person\\\/a0dca9413073b143bfc0db687dd0b0d6\",\"name\":\"Christin\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/b5497f25505814356d5235813688d08a9e63670586640e4bb29680889eabcc9b?s=96&d=robohash&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/b5497f25505814356d5235813688d08a9e63670586640e4bb29680889eabcc9b?s=96&d=robohash&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/b5497f25505814356d5235813688d08a9e63670586640e4bb29680889eabcc9b?s=96&d=robohash&r=g\",\"caption\":\"Christin\"},\"description\":\"A cybersecurity practitioner with more than 5 years of experience in the cybersecurity world. Has an interest in creating simple blog websites, learning about SEO and graphic design, writing, AI, and understanding the concepts of journalism. Intentionally created this website to make the world of cybersecurity more engaging by combining it with journalistic principles and presenting cybersecurity stories that are easy to understand, which can help anyone who wants to develop in the cybersecurity world.\",\"sameAs\":[\"https:\\\/\\\/secry.me\\\/explore\"],\"url\":\"https:\\\/\\\/secry.me\\\/explore\\\/author\\\/secry\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Understand what is Penetration Testing? Fundamental Knowledge | SECRY","description":"What is Penetration Testing? SECRY - PENTEST - Penetration testing, also known as pen test-ing or ethical hacking, is a simulated cyberattack against a","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/secry.me\/explore\/understand-what-is-penetration-testing-fundamental-knowledge\/","og_locale":"en_US","og_type":"article","og_title":"Understand what is Penetration Testing? Fundamental Knowledge | SECRY","og_description":"What is Penetration Testing? SECRY - PENTEST - Penetration testing, also known as pen test-ing or ethical hacking, is a simulated cyberattack against a","og_url":"https:\/\/secry.me\/explore\/understand-what-is-penetration-testing-fundamental-knowledge\/","og_site_name":"SECRY","article_publisher":"https:\/\/www.facebook.com\/secry.me","article_published_time":"2023-11-09T09:45:43+00:00","article_modified_time":"2023-11-15T02:56:35+00:00","og_image":[{"width":1024,"height":1024,"url":"https:\/\/secryweb.sirv.com\/WP_secry.me\/2023\/11\/6b51fa78-59d4-48bd-b494-41a9d0499275.jpg","type":"image\/jpeg"}],"author":"Christin","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Christin","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"NewsArticle","@id":"https:\/\/secry.me\/explore\/understand-what-is-penetration-testing-fundamental-knowledge\/#article","isPartOf":{"@id":"https:\/\/secry.me\/explore\/understand-what-is-penetration-testing-fundamental-knowledge\/"},"author":{"name":"Christin","@id":"https:\/\/secry.me\/explore\/#\/schema\/person\/a0dca9413073b143bfc0db687dd0b0d6"},"headline":"Understand what is Penetration Testing? Fundamental Knowledge","datePublished":"2023-11-09T09:45:43+00:00","dateModified":"2023-11-15T02:56:35+00:00","mainEntityOfPage":{"@id":"https:\/\/secry.me\/explore\/understand-what-is-penetration-testing-fundamental-knowledge\/"},"wordCount":502,"commentCount":1,"publisher":{"@id":"https:\/\/secry.me\/explore\/#organization"},"image":{"@id":"https:\/\/secry.me\/explore\/understand-what-is-penetration-testing-fundamental-knowledge\/#primaryimage"},"thumbnailUrl":"https:\/\/secry.me\/explore\/wp-content\/uploads\/2023\/11\/6b51fa78-59d4-48bd-b494-41a9d0499275.jpg","keywords":["Hacker","hacking","Penetration Tester"],"articleSection":["Cyber Security","Question"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/secry.me\/explore\/understand-what-is-penetration-testing-fundamental-knowledge\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/secry.me\/explore\/understand-what-is-penetration-testing-fundamental-knowledge\/","url":"https:\/\/secry.me\/explore\/understand-what-is-penetration-testing-fundamental-knowledge\/","name":"Understand what is Penetration Testing? Fundamental Knowledge | SECRY","isPartOf":{"@id":"https:\/\/secry.me\/explore\/#website"},"primaryImageOfPage":{"@id":"https:\/\/secry.me\/explore\/understand-what-is-penetration-testing-fundamental-knowledge\/#primaryimage"},"image":{"@id":"https:\/\/secry.me\/explore\/understand-what-is-penetration-testing-fundamental-knowledge\/#primaryimage"},"thumbnailUrl":"https:\/\/secry.me\/explore\/wp-content\/uploads\/2023\/11\/6b51fa78-59d4-48bd-b494-41a9d0499275.jpg","datePublished":"2023-11-09T09:45:43+00:00","dateModified":"2023-11-15T02:56:35+00:00","description":"What is Penetration Testing? SECRY - PENTEST - Penetration testing, also known as pen test-ing or ethical hacking, is a simulated cyberattack against a","breadcrumb":{"@id":"https:\/\/secry.me\/explore\/understand-what-is-penetration-testing-fundamental-knowledge\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/secry.me\/explore\/understand-what-is-penetration-testing-fundamental-knowledge\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secry.me\/explore\/understand-what-is-penetration-testing-fundamental-knowledge\/#primaryimage","url":"https:\/\/secry.me\/explore\/wp-content\/uploads\/2023\/11\/6b51fa78-59d4-48bd-b494-41a9d0499275.jpg","contentUrl":"https:\/\/secry.me\/explore\/wp-content\/uploads\/2023\/11\/6b51fa78-59d4-48bd-b494-41a9d0499275.jpg","width":1024,"height":1024,"caption":"A young man is doing Penetration Testing"},{"@type":"BreadcrumbList","@id":"https:\/\/secry.me\/explore\/understand-what-is-penetration-testing-fundamental-knowledge\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/secry.me\/explore\/"},{"@type":"ListItem","position":2,"name":"Understand what is Penetration Testing? Fundamental Knowledge"}]},{"@type":"WebSite","@id":"https:\/\/secry.me\/explore\/#website","url":"https:\/\/secry.me\/explore\/","name":"SECRY","description":"#1 Cyber [SEC]urity Sto[RY]  -  News &amp; Bug Bounty Story Collections","publisher":{"@id":"https:\/\/secry.me\/explore\/#organization"},"alternateName":"Security Story","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/secry.me\/explore\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/secry.me\/explore\/#organization","name":"#1 Cyber [SEC]urity Sto[RY] - News & Bug Bounty Story Collections","alternateName":"SECRY","url":"https:\/\/secry.me\/explore\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secry.me\/explore\/#\/schema\/logo\/image\/","url":"https:\/\/secryweb.sirv.com\/WP_secry.me\/2022\/06\/cropped-SECRY.webp","contentUrl":"https:\/\/secryweb.sirv.com\/WP_secry.me\/2022\/06\/cropped-SECRY.webp","width":512,"height":512,"caption":"#1 Cyber [SEC]urity Sto[RY] - News & Bug Bounty Story Collections"},"image":{"@id":"https:\/\/secry.me\/explore\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/secry.me","https:\/\/pinterest.com\/secry_me"]},{"@type":"Person","@id":"https:\/\/secry.me\/explore\/#\/schema\/person\/a0dca9413073b143bfc0db687dd0b0d6","name":"Christin","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/b5497f25505814356d5235813688d08a9e63670586640e4bb29680889eabcc9b?s=96&d=robohash&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/b5497f25505814356d5235813688d08a9e63670586640e4bb29680889eabcc9b?s=96&d=robohash&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/b5497f25505814356d5235813688d08a9e63670586640e4bb29680889eabcc9b?s=96&d=robohash&r=g","caption":"Christin"},"description":"A cybersecurity practitioner with more than 5 years of experience in the cybersecurity world. Has an interest in creating simple blog websites, learning about SEO and graphic design, writing, AI, and understanding the concepts of journalism. Intentionally created this website to make the world of cybersecurity more engaging by combining it with journalistic principles and presenting cybersecurity stories that are easy to understand, which can help anyone who wants to develop in the cybersecurity world.","sameAs":["https:\/\/secry.me\/explore"],"url":"https:\/\/secry.me\/explore\/author\/secry\/"}]}},"_links":{"self":[{"href":"https:\/\/secry.me\/explore\/wp-json\/wp\/v2\/posts\/4121","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/secry.me\/explore\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/secry.me\/explore\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/secry.me\/explore\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/secry.me\/explore\/wp-json\/wp\/v2\/comments?post=4121"}],"version-history":[{"count":6,"href":"https:\/\/secry.me\/explore\/wp-json\/wp\/v2\/posts\/4121\/revisions"}],"predecessor-version":[{"id":4132,"href":"https:\/\/secry.me\/explore\/wp-json\/wp\/v2\/posts\/4121\/revisions\/4132"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/secry.me\/explore\/wp-json\/wp\/v2\/media\/4128"}],"wp:attachment":[{"href":"https:\/\/secry.me\/explore\/wp-json\/wp\/v2\/media?parent=4121"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/secry.me\/explore\/wp-json\/wp\/v2\/categories?post=4121"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/secry.me\/explore\/wp-json\/wp\/v2\/tags?post=4121"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}